Windows Security and User Management Concepts

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

Administrator, Guest

What user accounts are created automatically and disabled by default when Windows is installed?

2
New cards

Password Policy

Which option can Roger change in Windows to require more complex passwords?

3
New cards

TACACS+

Which option would James recommend as an upgrade to RADIUS?

4
New cards

Audit login failures

Which of the following components of policies will allow for event-based monitoring?

5
New cards

Network topology

While researching a network issue, Randy discovered a diagram that he can use to see the design of the network.What type of documentation did Randy discover?

6
New cards

Group Policy to run a logon script

Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows.How can the settings be configured with the least effort by the admin?

7
New cards

RADIUS

Jennifer's company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting to manage users on its network. The company uses a wireless network and an earlier authentication service on the server to authenticate end users accessing resources on the network. Which service is Jennifer's company making use of?

8
New cards

Advanced Security Settings

A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change.What step would the technician take to make the change?

9
New cards

Event Viewer

Zach believes someone is trying to log in to a computer system in order to gain access to the company's network. He wants to use Windows to determine if that is the case.Where can Zach go to check the security logs?

10
New cards

Backward compatibility for legacy operating systems and applications.

An administrator is assigning Windows user accounts to user groups based on the user's role and notices the built-in Power Users group.What is the purpose of the Power Users group in Windows 7 and later?

11
New cards

Out of scope modification

Becky has been assigned to help with a major change to her company's accounts database. During the time of the change, Becky notices that her task will need to be modified to complete the change. Instead of telling her supervisor, she determines that the minor detail must have been overlooked and fixes what she believes is the problem. The minor detail that Becky did not tell her supervisor caused the change to fail.What is Becky's mistake called?

12
New cards

The file will lose all permissions.

A Windows 10 user is copying a file from the C:\data folder to the E:\data folder. The C: drive is formatted with NTFS, and the D: drive is formatted with FAT32.What happens to the permissions of the file on the D:\ drive when copied?

13
New cards

Take ownership of the folder and change permissions

You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user.How can you best solve this issue without losing data in the folder?

14
New cards

Network printer

A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable.What term best describes this method of printer connectivity?

15
New cards

Logon time restrictions

What step can be taken to limit access to the computer after business hours?